A survey of payload-based traffic classification approaches

M Finsterbusch, C Richter, E Rocha… - … Surveys & Tutorials, 2013 - ieeexplore.ieee.org
Internet traffic classification has been the subject of intensive study since the birth of the
Internet itself. Indeed, the evolution of approaches for traffic classification can be associated …

Implementation of deep packet inspection in smart grids and industrial Internet of Things: Challenges and opportunities

GDLT Parra, P Rad, KKR Choo - Journal of Network and Computer …, 2019 - Elsevier
Upgrading a power grid to a smart grid is a challenging task. For example, since power grids
were originally developed to support unidirectional communications, the migration process …

A survey on regular expression matching for deep packet inspection: Applications, algorithms, and hardware platforms

C Xu, S Chen, J Su, SM Yiu… - … Surveys & Tutorials, 2016 - ieeexplore.ieee.org
Deep packet inspection (DPI) is widely used in content-aware network applications such as
network intrusion detection systems, traffic billing, load balancing, and government …

[图书][B] The state of the art in intrusion prevention and detection

ASK Pathan - 2014 - api.taylorfrancis.com
Most of the security threats in various communications networks are posed by the illegitimate
entities that enter or intrude within the network perimeter, which could commonly be termed …

Privacy-preserving detection of sensitive data exposure

X Shu, D Yao, E Bertino - IEEE transactions on information …, 2015 - ieeexplore.ieee.org
Statistics from security firms, research institutions and government organizations show that
the number of data-leak instances have grown rapidly in recent years. Among various data …

[HTML][HTML] BFCN: A novel classification method of encrypted traffic based on BERT and CNN

Z Shi, N Luktarhan, Y Song, G Tian - Electronics, 2023 - mdpi.com
With the speedy advancement of encryption technology and the exponential increase in
applications, network traffic classification has become an increasingly important research …

[HTML][HTML] Tsfn: A novel malicious traffic classification method using bert and lstm

Z Shi, N Luktarhan, Y Song, H Yin - Entropy, 2023 - mdpi.com
Traffic classification is the first step in network anomaly detection and is essential to network
security. However, existing malicious traffic classification methods have several limitations; …

Fast detection of transformed data leaks

X Shu, J Zhang, DD Yao, W Feng - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
The leak of sensitive data on computer systems poses a serious threat to organizational
security. Statistics show that the lack of proper encryption on files and communications due …

Presence and discernability in conventional and non-photorealistic immersive augmented reality

W Steptoe, S Julier, A Steed - 2014 IEEE International …, 2014 - ieeexplore.ieee.org
Non-photorealistic rendering (NPR) has been shown as a powerful way to enhance both
visual coherence and immersion in augmented reality (AR). However, it has only been …

Field-split parallel architecture for high performance multi-match packet classification using FPGAs

W Jiang, VK Prasanna - Proceedings of the twenty-first annual …, 2009 - dl.acm.org
Multi-match packet classification is a critical function in network intrusion detection systems
(NIDS), where all matching rules for a packet need to be reported. Most of the previous work …